Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1548992pxa; Thu, 20 Aug 2020 14:20:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw6MLM7PgJTGgcXyPQ6PDwZ8T20cHiCfLgnSjt/NlxF9qDxJ8GQPTRC5QH8+PW44h5TkzGu X-Received: by 2002:aa7:c50b:: with SMTP id o11mr494746edq.59.1597958435435; Thu, 20 Aug 2020 14:20:35 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1597958435; cv=pass; d=google.com; s=arc-20160816; b=ujUSFYStsZ3mx0aVwZS1MChqU+jlT2KcDj1ZAQVAPPLcnncsNtXdApim/ZJQfcLa7D AjQprWOASI2PYbLuHotIPii9F5Wjt8orZpdVIhLMm6zuxv55FqXE+yDn2ABje3nBpQWU 7lKVxMibGYK7nB/vf8xj7BfkAds8Bx/4Cff0pqxlOQ1kblGS6M05EWnuArzbTQO1LDXn 4wEj8NIr5AkPLx0vqf7SINHWja9l/zDnfEuIhM7zzV38OwYb01Urj3C6kVXq9Fs7YGF4 gkdO/ycHv5kzPnbrTLJJS4QVKlFjyGrtDpW6yoEOY9sOMcvM5WrX6puHsmS2NxB2Dk9K uzzw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:in-reply-to:user-agent:date:message-id:references :cc:to:from:subject:dkim-signature; bh=pWMnk7ndQxYT3Pa6wu9c8YL+T0ILc0x9XdbpMP+xF8w=; b=p6jqrMA/F8HxCgjECmUs67McL3WqanosVxZaLWR9F5twJkw8xLNGVfPun4m4ykwmVh g3aQLHtv2GkVy35DrR/LhxZrLBUbezA4bOuVgN62xBZP6akBZCi29cVKlb+Sc+sL6oz2 Xdm8dNb0Q1fLAlb9FdqvEBNuGj6cphvcrOsG5Je/QsMeB0O6DTIt/SVeAHIXZe7Q8QxJ 8bN2Yxz3dzr5QefNeoCXQ4wXMuzEn1zwLvCJ1oVRH+7UgeeAUt90LuGrhCHNSijz9K02 XpRk57c892jr/7ALGm1/cKKuzzPPQh9vGH0760g0ppcsC4RONdODnGWmOHmTa+dntD8w vJyg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=LZGfn6o1; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qc14si2274933ejb.8.2020.08.20.14.20.07; Thu, 20 Aug 2020 14:20:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=LZGfn6o1; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727066AbgHTSeJ (ORCPT + 99 others); Thu, 20 Aug 2020 14:34:09 -0400 Received: from mail-bn8nam12on2061.outbound.protection.outlook.com ([40.107.237.61]:61644 "EHLO NAM12-BN8-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726701AbgHTSeG (ORCPT ); Thu, 20 Aug 2020 14:34:06 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Csqcu8cClkN4IqyYTGGMwvoP/ctEEBuTMJES0qL/TLZMcKDzVEMvZpPlrNpq38/RgF07PJnM9+AGt9j+cegmlSwLZaR4XCidvo6DEg2TEHkUqsNU2zFKaIYml2J+K2f+PZOE1KT/TdEPy4BjJxLAVdethtLLcnk94LbE9uVP4doJ5ri2/hzCmtw3Piuz519+AtyHZ+WRR+M7X6+uNGx0fapsIZOVSypE85PAYGg40oVsxJZVBHTDnHixUky+UgSD2hL6FkuNYrRTDU6x1YiUGPtmH8EogC5Mh0+oSoShfOnc+EnBOkoYvVEZlOnQqs4VHPPZG4D4oBRbTe2HISnwaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pWMnk7ndQxYT3Pa6wu9c8YL+T0ILc0x9XdbpMP+xF8w=; b=Ww2J1zCDVlnwpgWB6wF9ZvFDBaARG7NoRuiBbM41pSaDUXmLkTtVMygzcZyb8vDAYGN1uhHaubm38akNUQH+M6ZAX9JzNen8Ww+9VWUxu2EkkdBNriPs/xz2yxE0rkqggLA/PCuT8WFfVU6BlssURT4/TxYbbzONnNFeQ5E4fZNzOKWT+V6WqHjdyAnp8/aP2exrXgcp63Ur7Ef1Zd4YYb/lQVy6UCB1MSUomBga13e0r/XQdCt58STndNHuCM19/rw4eE1MakWiEg5HYKBzmALSJxZE34gtsVoLKLXkP52Zw2PtbqgDmXR27TFL4vzz5VvhWRFeNNZ3oTVVJKi4bw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pWMnk7ndQxYT3Pa6wu9c8YL+T0ILc0x9XdbpMP+xF8w=; b=LZGfn6o1Ij1EHhHx+dWdjEDOD8i86Mv7FNoFSTE04GGCUqGusgUi+jJhw5bFPIELACW52UZQXphfSVDoQBBIbuAvRGXK9iv9WjyZ4QISefcvDYKOPMaZyAqRehEajzvW/RvrdAzQ6YXpK3pg779kwKmqgBJ4BeozbA3qV/s50C8= Authentication-Results: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=amd.com; Received: from DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) by DM6PR12MB4484.namprd12.prod.outlook.com (2603:10b6:5:28f::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3305.24; Thu, 20 Aug 2020 18:34:03 +0000 Received: from DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::299a:8ed2:23fc:6346]) by DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::299a:8ed2:23fc:6346%3]) with mapi id 15.20.3305.026; Thu, 20 Aug 2020 18:34:03 +0000 Subject: Re: FSGSBASE causing panic on 5.9-rc1 From: Tom Lendacky To: Andy Lutomirski Cc: Sean Christopherson , Joerg Roedel , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Linux Kernel Mailing List , X86 ML , "Chang S. Bae" , Thomas Gleixner , Sasha Levin , Borislav Petkov , Peter Zijlstra , Ingo Molnar References: <39d57e4d-5db4-f536-6f5e-6b0414c0dccc@amd.com> <7dedb0ab-56a6-5d96-577b-21ab1ecdad24@amd.com> <20200820151049.GA26595@sjchrist-ice> <362f5a45-b808-25ad-b99b-449e05717c4a@amd.com> <45e16c5c-ce99-33da-99c8-ea52ef0945db@amd.com> Message-ID: <68478297-ff21-fa38-a37b-2e1e515fdc5e@amd.com> Date: Thu, 20 Aug 2020 13:34:00 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SN4PR0501CA0074.namprd05.prod.outlook.com (2603:10b6:803:22::12) To DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from 255.255.255.255 (255.255.255.255) by SN4PR0501CA0074.namprd05.prod.outlook.com (2603:10b6:803:22::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3326.10 via Frontend Transport; Thu, 20 Aug 2020 18:34:02 +0000 X-Originating-IP: [67.79.209.213] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 3af23eb7-1850-4797-643f-08d845379d14 X-MS-TrafficTypeDiagnostic: DM6PR12MB4484: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:6108; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: elYdRxQo7yZTXCfWoFiR/Vj81T23DNmBZHoJ3mtUulR/rXcaS57SjLfcNAQO/mH+RosiuHbvXPXnhpIGJ0fYxok3Yb/1ArkxLD/HK9YwQrQfJ03jIYCBCJQaEnvtvTWFmYJCNLCgiibaU0BCevjRr36Bcsf2Y/uwIwhybQ7iazLb24WedeHFsmR2uSG8zCSkipxPFyEnVRU9iidFWkF1t+B4uAtyimeV2Hfb3NCSoi9U/9iWtAFK7tHZsIAJmdgZ19Gkfj5CgVxqjahtiLkVLbWOGKjXq2eDAk6WAoL9G0gACDZMURl0as30tMJBXnQe7wvZ9nLJGInjJ2ADVl7G9hGnzlpCSAP5XHfWvzd1PzZ6VtsOoH0vUjDK9cY9iBIRwd3w0/2tga9IU7eLbrcTk2uxmYYv9WSva5sr6bsLdtg= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR12MB1355.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(346002)(376002)(39860400002)(136003)(396003)(366004)(66476007)(66946007)(5660300002)(6916009)(7416002)(66556008)(36756003)(86362001)(31696002)(26005)(478600001)(52116002)(53546011)(186003)(316002)(2616005)(16576012)(4326008)(6486002)(2906002)(956004)(31686004)(8936002)(54906003)(8676002)(110011004)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3af23eb7-1850-4797-643f-08d845379d14 X-MS-Exchange-CrossTenant-AuthSource: DM5PR12MB1355.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Aug 2020 18:34:03.5211 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: VHAiQ1Q72mAHPe1k9bcecP12uI3DV4xCoArOmltfOd/uoLDPL4n+k+rLAYyx3bt8gDcef3zJqxTsuGpan6DNgQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR12MB4484 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/20/20 11:30 AM, Tom Lendacky wrote: > On 8/20/20 11:17 AM, Tom Lendacky wrote: >> On 8/20/20 10:55 AM, Andy Lutomirski wrote: >>> On Thu, Aug 20, 2020 at 8:21 AM Tom Lendacky >>> wrote: >>>> >>>> On 8/20/20 10:10 AM, Sean Christopherson wrote: >>>>> On Wed, Aug 19, 2020 at 05:21:33PM -0700, Andy Lutomirski wrote: >>>>>> On Wed, Aug 19, 2020 at 2:25 PM Andy Lutomirski >>>>>> wrote: >>>>>>> >>>>>>> On Wed, Aug 19, 2020 at 11:19 AM Tom Lendacky >>>>>>> wrote: >>>>>>>> >>>>>>>> On 8/19/20 1:07 PM, Tom Lendacky wrote: >>>>>>>>> It looks like the FSGSBASE support is crashing my second >>>>>>>>> generation EPYC >>>>>>>>> system. I was able to bisect it to: >>>>>>>>> >>>>>>>>> b745cfba44c1 ("x86/cpu: Enable FSGSBASE on 64bit by default and >>>>>>>>> add a chicken bit") >>>>>>>>> >>>>>>>>> The panic only happens when using KVM. Doing kernel builds or stress >>>>>>>>> on bare-metal appears fine. But if I fire up, in this case, a >>>>>>>>> 64-vCPU >>>>>>>>> guest and do a kernel build within the guest, I get the following: >>>>>>>> >>>>>>>> I should clarify that this panic is on the bare-metal system, not >>>>>>>> in the >>>>>>>> guest. And that specifying nofsgsbase on the bare-metal command >>>>>>>> line fixes >>>>>>>> the issue. >>>>>>> >>>>>>> I certainly see some oddities: >>>>>>> >>>>>>> We have this code: >>>>>>> >>>>>>> static void svm_vcpu_put(struct kvm_vcpu *vcpu) >>>>>>> { >>>>>>>           struct vcpu_svm *svm = to_svm(vcpu); >>>>>>>           int i; >>>>>>> >>>>>>>           avic_vcpu_put(vcpu); >>>>>>> >>>>>>>           ++vcpu->stat.host_state_reload; >>>>>>>           kvm_load_ldt(svm->host.ldt); >>>>>>> #ifdef CONFIG_X86_64 >>>>>>>           loadsegment(fs, svm->host.fs); >>>>>>>           wrmsrl(MSR_KERNEL_GS_BASE, current->thread.gsbase); >>>>> >>>>> Pretty sure current->thread.gsbase can be stale, i.e. this needs: >>>>> >>>>>        current_save_fsgs(); >>>> >>>> I did try adding current_save_fsgs() in svm_vcpu_load(), saving the >>>> current->thread.gsbase value to a new variable in the svm struct. I then >>>> used that variable in the wrmsrl below, but it still crashed. >>> >>> Can you try bisecting all the way back to: >>> >>> commit dd649bd0b3aa012740059b1ba31ecad28a408f7f >>> Author: Andy Lutomirski >>> Date:   Thu May 28 16:13:48 2020 -0400 >>> >>>      x86/cpu: Add 'unsafe_fsgsbase' to enable CR4.FSGSBASE >>> >>> and adding the unsafe_fsgsbase command line option while you bisect. >> >> I'll give that a try. Bisecting with unsafe_fsgsbase identified: c82965f9e530 ("x86/entry/64: Handle FSGSBASE enabled paranoid entry/exit") But I'm thinking that could be because it starts using GET_PERCPU_BASE, which on Rome would use RDPID. So is SVM restoring TSC_AUX_MSR too late? That would explain why I don't see the issue on Naples, which doesn't support RDPID. Thanks, Tom >> >>> >>> Also, you're crashing when you run a guest, right?  Can you try >> >> Right, when the guest is running. The guest boots fine and only when I >> put some stress on it (kernel build) does it cause the issue. It might >> be worth trying to pin all the vCPUs and see if the crash still happens. >> >>> running the x86 sefltests on a bad kernel without running any guests? >> >> I'll give that a try. > > All the selftests passed. > > Thanks, > Tom > >> >> Thanks, >> Tom >> >>> >>> --Andy >>>